First published: Mon Jun 08 2009(Updated: )
inc/init.php in DokuWiki 2009-02-14, rc2009-02-06, and rc2009-01-30, when register_globals is enabled, allows remote attackers to include and execute arbitrary local files via the config_cascade[main][default][] parameter to doku.php. NOTE: PHP remote file inclusion is also possible in PHP 5 using ftp:// URLs.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
DokuWiki | =2009-02-14 | |
DokuWiki | =rc2009-01-30 | |
DokuWiki | =rc2009-02-06 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1960 has a moderate severity rating as it allows remote attackers to execute arbitrary local files if register_globals is enabled.
To fix CVE-2009-1960, disable register_globals in the PHP configuration and update to a secure version of DokuWiki.
CVE-2009-1960 affects DokuWiki versions rc2009-02-06, 2009-02-14, and rc2009-01-30.
Yes, CVE-2009-1960 can allow remote file inclusion if the server is running an affected version of DokuWiki with register_globals enabled.
The potential consequences of CVE-2009-1960 include unauthorized access to sensitive files and the execution of malicious code on the server.